Aristotel Tentov

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Many closed internal information systems (IS) must not concern much about its security. But, nowadays, mostly due to globalization and dynamic world, business demands integration of several legacy ISs into new one. The new IS must improve its security compared to legacy ISs, because they work in the heterogeneous environment, and need to be opened. Adding(More)
As technology advances, network connection links are gaining higher capacities, and consequently, networking hardware experiences difficulties to timely satisfy such link requests for throughput, bandwidth, speed, and delays. In the given situation, it becomes a necessity to research new ways of augmenting routing performances for achieving respectable(More)
In this paper, a mathematical method for analysis of synchronous packet-switching interconnection networks with jinite buffering capacity at the output of switching elements is presented. The proposed mathematical method is general in that it analyzed interconnection networks under uniform and nonuniform traflc with blocking. The existing methods for(More)
  • 1